Fig. 8From: A decade of research on patterns and architectures for IoT securityContributions distributed over the seven layers (Juxtology 2018)Back to article page